Toward RPL Attacks and Mitigation Taxonomy: Systematic Literature Review Approach

被引:11
作者
Albinali, Hussah [1 ,2 ]
Azzedin, Farag [1 ,3 ]
机构
[1] King Fahd Univ Petr & Minerals, Informat & Comp Sci Dept, Dhahran 34463, Saudi Arabia
[2] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Networks & Commun Dept, Dammam 34212, Saudi Arabia
[3] King Fahd Univ Petr & Minerals, Interdisciplinary Res Ctr Intelligent Secure Syst, Dhahran 34463, Saudi Arabia
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2024年 / 21卷 / 05期
关键词
routing attacks; attacks classification; RPL; mitigation methods classification; systematic literature review; INTRUSION DETECTION SYSTEM; VERSION NUMBER ATTACKS; ROUTING PROTOCOL; LOW-POWER; INTERNET; IOT; NETWORKS; 6LOWPAN; THINGS; SECURITY;
D O I
10.1109/TNSM.2024.3386468
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The RPL protocol was initially created to connect multiple IP-based communication applications in low-power and lossy network environments. However, it has become a target for numerous attacks, which have sparked a need for researchers to develop effective security measures. In this article, we conduct a comprehensive literature review covering 175 papers on RPL attacks and their mitigation solutions. Our rigorous selection process provides a deep understanding of how RPL is exploited for different attacks and the solutions designed to mitigate such attacks. Our study proposes RPL attacks taxonomy based on the attack vector, along with mitigation solutions taxonomy. RPL attacks are classified based on the attack vector, such as generating, dropping, modifying, or replaying specific control messages. The mitigation solutions include authenticating, updating, discarding, encrypting, and isolating attacking nodes. Furthermore, we presented evaluation metrics in the literature to evaluate the performance of mitigation solutions. Besides, we proposed efficiency criteria to assess mitigation solutions' efficiency. The review aims to uncover innovative techniques that can effectively safeguard networks against routing attacks.
引用
收藏
页码:5215 / 5238
页数:24
相关论文
共 223 条
[1]   Customised Intrusion Detection for an Industrial IoT Heterogeneous Network Based on Machine Learning Algorithms Called FTL-CID [J].
Abosata, Nasr ;
Al-Rubaye, Saba ;
Inalhan, Gokhan .
SENSORS, 2023, 23 (01)
[2]   DETONAR: Detection of Routing Attacks in RPL-Based IoT [J].
Agiollo, Andrea ;
Conti, Mauro ;
Kaliyar, Pallavi ;
Lin, Tsung-Nan ;
Pajola, Luca .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (02) :1178-1190
[3]   Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks [J].
Ahmed, Firoz ;
Ko, Young-Bae .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) :5143-5154
[4]  
Ahsan MS, 2017, INT CONF INF COMMUN, P58, DOI 10.1109/ICICT.2017.8320165
[5]   SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things [J].
Airehrour, David ;
Gutierrez, Jairo A. ;
Ray, Sayan Kumar .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 :860-876
[6]  
Airehrour D, 2017, Journal of Telecommunications and the Digital Economy, V5, P50, DOI [10.18080/jtde.v5n1.88, 10.18080/ajtde.v5n1.88, 10.18080/jtde.v5n1.88, DOI 10.18080/JTDE.V5N1.88, DOI 10.18080/AJTDE.V5N1.2]
[7]  
Airehrour D, 2016, 2016 26TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), P115, DOI 10.1109/ATNAC.2016.7878793
[8]   An architecture for resilient intrusion detection in ad -hoc networks [J].
Al Qurashi, Mohammed ;
Angelopoulos, Constantinos Marios ;
Katos, Vasilios .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 53
[9]   A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things [J].
Al-Amiedy, Taief Alaa ;
Anbar, Mohammed ;
Belaton, Bahari ;
Bahashwan, Abdullah Ahmed ;
Hasbullah, Iznan Husainy ;
Aladaileh, Mohammad Adnan ;
AL Mukhaini, Ghada .
INTERNET OF THINGS, 2023, 22
[10]   A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things [J].
Al-Amiedy, Taief Alaa ;
Anbar, Mohammed ;
Belaton, Bahari ;
Kabla, Arkan Hammoodi Hasan ;
Hasbullah, Iznan H. ;
Alashhab, Ziyad R. .
SENSORS, 2022, 22 (09)